Researchers just lately revealed a vulnerability in Apache Struts, a well-liked sort of enterprise software. Lively exploit makes an attempt weren’t far behind.
The Equifax hack that occurred roughly a yr in the past was because of an ea...

Crypto-mining malware attacks towards iPhones went up 400% within the last two weeks of September, safety firm Verify Point notes in a new report.
Crypto-mining assaults have intensified over the previous couple of years, fueled by an enormou...

Many small-to-medium companies (SMBs) assume they’re flying beneath the radar of cyber-attackers. But in actuality, perpetrators particularly goal smaller, more weak businesses due to their lack of safety experience and fragile infrastructur...

Smartphones have grow to be synonymous with on a regular basis business operations, enabling staff to store necessary contact particulars, browse the online and reply to emails while on the transfer. Nevertheless, the ubiquity of such units has le...

Whether or not it’s phishing attacks or zero-day exploits, businesses are dealing with an growing number of cyber threats day by day. And when these attacks are profitable, companies can face each reputational and monetary penalties. The tru...

Over the approaching years, the very foundations of at this time’s digital world will shake &- violently. Revolutionary and decided attackers, together with seismic modifications to the best way organizations conduct their operations, wi...

Within the evolving world of cybersecurity, enterprises need access to cyber insurance that accurately reflects their current safety posture and that covers each direct and oblique expenses. The identical problem, in fact, applies to the insurers...

A whole lot of execs from all over the world will meet in Atlanta, Ga., on October 22-25, for& SecurityWeek's 2018 ICS Cyber Security Conference, the most important and longest-running conference dedicated to industrial and significant inf...

In 2017 and 2018, a Russian cyber-espionage group believed to be government-backed has engaged in covert attacks targeting military and government organizations in Europe and South America, Symantec warns.&
Tracked as APT28 but also refer...

In August, President Trump signed the NIST Small Business Cybersecurity Act, directing NIST to develop a streamlined version of its Cybersecurity Framework to protect small businesses (SMBs) who have traditionally been unable to invest in their ow...

Ransomware has been a notable threat since the infamous Cryptolocker hit headlines back in 2013.&
Since then, multiple iterations, copycats, and a plethora of new ransomware families have entered the scene. Some of the more prolific, such...

Your cyber health should be on your mind as much as your physical health, if it isn’t already.
Whether you are at home, in town, in the workplace, or somewhere in-between, our dependence on digital connections has made any potential secu...

These days it’s pretty commonplace knowledge that when it comes to clouds &- being as dynamic and fast paced as they are &- organizations need as much insight as they can get in order to recognize where any looming threats might be,...

Those of us on the security side of the DevOps vs. company security argument tend to only see one side of the story as the truth &- the security side. But that’s not always true.
Traditionally, DevOps and security have butted heads....